General
-
Target
97421e5e6da47a0ebb07c7e4c2c4d730a6ae571a4ee5a22a497f7e52f6cf4fb0
-
Size
551KB
-
Sample
230322-3zhbeacb74
-
MD5
67d9bdd608258f033d7feb03df7f95a9
-
SHA1
7ba0cee1312b7431790e752eb91b1cc348558132
-
SHA256
97421e5e6da47a0ebb07c7e4c2c4d730a6ae571a4ee5a22a497f7e52f6cf4fb0
-
SHA512
0b820e914a25425adce55a2c81b0966aaa1f804b329df8904f16f8f7e8c06f195a25120c0768b69a57da26d4d318b514bf69706628ef46ae94f471302a27088d
-
SSDEEP
12288:VMrWy90/pK59uvpA1jAbhqG71S1Q+RcJcKscqRqN5dNHX6Eq:zyoprO1sbhqyWbRcmvgrdFqEq
Static task
static1
Behavioral task
behavioral1
Sample
97421e5e6da47a0ebb07c7e4c2c4d730a6ae571a4ee5a22a497f7e52f6cf4fb0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
97421e5e6da47a0ebb07c7e4c2c4d730a6ae571a4ee5a22a497f7e52f6cf4fb0
-
Size
551KB
-
MD5
67d9bdd608258f033d7feb03df7f95a9
-
SHA1
7ba0cee1312b7431790e752eb91b1cc348558132
-
SHA256
97421e5e6da47a0ebb07c7e4c2c4d730a6ae571a4ee5a22a497f7e52f6cf4fb0
-
SHA512
0b820e914a25425adce55a2c81b0966aaa1f804b329df8904f16f8f7e8c06f195a25120c0768b69a57da26d4d318b514bf69706628ef46ae94f471302a27088d
-
SSDEEP
12288:VMrWy90/pK59uvpA1jAbhqG71S1Q+RcJcKscqRqN5dNHX6Eq:zyoprO1sbhqyWbRcmvgrdFqEq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-